June grade 12 terminology Flashcards

1
Q

4G (LTE)

A

4G is the fourth generation of cellular wireless standard and is a successor to 3G. 4G
networks use different frequencies to transmit data and should achieve far higher speeds that
3G.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

64-bit

A

64-bit computers have a processor that work with 64 bits at a time. This means that memory
addresses, register sizes, address and data bus sizes and instruction sizes are all 64 bits in
length. In other words the computer is able to process at most 64 bits of data at once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access point

A

Also called a base station, consists of a sender/receiver (transceiver) and an antenna which
transmits and receives radio signals so that the devices that have a wireless network card are
able to communicate with the rest of network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Activation codes

A

A series of letters and digits that must be entered during software installation to authenticate
that copy of the software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ADSL

A

Asymmetric digital subscriber line Digital Subscriber Line. Used by homes and businesses
for dedicated dig ital high speed connection to the internet over conventional phone lines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adware

A

Software that automatically displays or downloads advertising material such as banners or
pop- ups when a user is online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Anomalies

A

Errors which occur when editing a database that has not been normalised. They include
UPDATE, INSERT and DELETE anomalies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Anti virus software

A

Anti-virus software is a program or set of programs that are designed to detect, prevent and
remove software viruses, and other malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

API

A

Application Programming Interface. The form of an API varies depending on the type of
programming language but often it is a library of programming modules which facilitate the
creation of applications which communicate with the Operating System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Archive

A

To copy and compress data files to a long-term storage medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BitTorrent

A

BitTorrent is a peer-to-peer (P2P) file sharing protocol designed to reduce the bandwidth
required to transfer files. For example, if a user begins downloading a movie file, the
BitTorrent system will locate multiple computers with the same file and begin downloading
the file from several computers at once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Artificial Intelligence

A

Simulation of human decision-making processes by a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Assembler

A

A program that translates a programmer’s code, written in Assembly Code, into executable
machine code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BIOS

A

Basic Input Output System – the essential start up instructions of a computer, stored in ROM
on the motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Blockchain

A

A system in which a record of transactions made in bitcoin or another cryptocurrency are
maintained across several computers that are linked in a peer-to-peer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Asymmetric
Encryption

A

Cryptographic algorithms (keys) which comprise of two separate keys, one of which is secret
(or private) and one of which is public. The pair of keys are mathematically linked but one
cannot be derived from the other, i.e. if a user has the public key he cannot work out the
private key (or vice versa).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Attenuation

A

Attenuation is the reduction in signal strength while transmitting data. The further the signal
gets from the source the weaker it will become.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Audio and Video on
Demand (AVOD)

A

Video on demand (VOD) or audio and video on demand (AVOD) are systems which allow
users to select and watch/listen to video or audio content when they choose to, rather than
having to watch at a specific broadcast time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AUP

A

Acceptable Usage Policy, a document that outlines the rights and responsibilities of users
within a network environment, including the consequences of violating these stipulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Audit trail

A

An audit trail (also called audit log) is a security-relevant chronological record, set of
records, and/or destination and source of records that provide documentary evidence of the
sequence of activities that have affected at any time a specific operation, procedure, or event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Backup

A

A copy of data files and other relevant files stored to enable full restoration of service in the
event of data loss. There is a trend towards cloud based backup services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Bandwidth

A

The total amount of data that can be transferred from one point to another in a given period
of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Biometrics

A

Security based on identification of unique physical characteristics of a person such as
fingerprints and retina.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Big Data

A

Big data is a combination of structured, semistructured and unstructured data collected by
organizations that can be mined for information and used in machine learning projects,
predictive modeling and other advanced analytics applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Blog
A blog reads like a journal with the most recent entry at the top.
26
Botnets
Also known as a zombie army. A botnet is a group of computers which have been infected by malware and are controlled from a server to run related software programs and scripts. Often utilised to forward spam
27
HTTPS
Hypertext Transfer Protocol Secure (HTTPS) is a secure variant of HTTP that adds a layer of security on the data in transit through a secure socket layer (SSL) whereby the entire webpage is encrypted before transfer.
28
Bluetooth
A wireless technology that allows devices such as a mouse, printers and cellphones to communicate over a relatively short distance, typically less than 10 m.
29
HTTP
HyperText Transfer Protocol is an application-layer protocol used to transmit Hypertext on the internet.
30
Control unit
The Control Unit (CU) section of the CPU directs all CPU operations. It controls the fetch execute cycle and sequence of operations and interprets the instructions.
31
Cookie
A collection of information, stored in a small text file on the local computer of a person using the World Wide Web, used chiefly by websites to identify users who have previously registered or visited the site.
32
Bridge
Device that links two networks segments and can reduce network traffic.
33
Buffer
A 'data buffer' is a region of memory which is used to temporarily hold data while it waits for some form of further processing often by a slower or busier device that cannot handle the data immediately.
34
Bus
A set of electrical paths etched on a motherboard to transport data, instructions or addresses between components on the motherboard.
35
Cache memory
Instructions and data are prefetched from slower RAM and placed cache in order to speed up the CPUs processing. Cache memory is made up of SRAM chips.
36
Caching
The principle of using a faster device to speed up access from a slower device. For example disk caching is where RAM is used to store blocks of data to speed up access from the slower hard drive.
37
Cap
A bandwidth cap limits the total amount of data which can be downloaded over a given period of time.
38
Check digit
Number added to a code (such as a bar code or account number) to verify that transmitted data is received correctly. The check digit before transmission should remain the same on the receipt.
39
Chipset
A chipset is a group of integrated circuits that work together. It is a set of chips used on a motherboard to connect components. For example the Northbridge (connected to fast components such as RAM) and the Southbridge (connected to slower components such as the HDD).
40
Client-server
Client: A client is a computer terminal that retrieves information from or uses resources provided by a server. Server: A powerful computer which provides services to clients on a network.
41
Cloud Computing
Cloud computing is an Internet service which can provide on-line applications, store data on-line and in a recent trend provide hardware for use on-line.
42
CMOS
Complementary Metal Oxide Semiconductor – A technology for producing the type of memory that stores the various user configurable computer startup settings that can be updated or changed.
43
Compiler
A program that translates an entire high level program source code into object code. The object code is machine code which may be used to create standalone 'executable files'.
44
Composite keys/ compound key
A composite key is a combination of two or more fields in a table to create a Primary Key.
45
Compression
Compression is the process of applying an algorithm to a file to reduce its size. Lossless compression is where data is compressed without losing any portion of the data. It allows the exact original data to be reconstructed. Lossy compression loses detail so that the file is not restored to its original size.
46
GPU
Graphics Processing Unit – dedicated graphics processor on a graphics card, used to render images stored in the RAM of the graphics card.
47
Hardware Interrupt
A signal to the CPU indicating a device needs attention. For example, a mouse click or a keystroke.
48
HDMI
High-Definition Multimedia Interface for transferring high definition video and audio.
49
Hoaxes
An email that provides a warning about a virus, worm or some other disaster, and urges recipients to forward the message thereby generating unnecessary traffic.
50
Hot-pluggable/Hotswappable .
Hot plugging is the ability to replace or install a device without shutting down the attached computer.
51
Hotspot
An area, usually in a public space such as an airport, restaurant or hotel lobby, where people may receive and be granted WiFi access from an access point to connect wirelessly to the Internet.
52
HTML
Hypertext Markup Language used to create webpages. The tags (

This is a heading

) are translated by web browsers into the graphical representation shown on the computer screen.
53
HTTP
HyperText Transfer Protocol is an application-layer protocol used to transmit Hypertext on the internet
54
WeB LOG
Websites updated regularly with news and events in chronological order
55
Copyright
The exclusive legal right to reproduce, publish, sell, or distribute original work (such as computer publications, graphics and software).
56
Cyber crimes
Criminal activity using computers on the Internet or any network.
57
Dark Web
The dark web is the part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable. The dark web forms a small part of the deep web, the part of the Web not indexed by web search engines.
58
Data dependency
A data dependency in a database is where one field has a dependency or relationship with another field. For example knowing a person's ID number can produce their name.
59
Data Integrity
Data integrity refers to the overall completeness, accuracy and consistency of data.
60
Data mining
The use of sophisticated software to examine a large volume of information stored in many databases on-line to discover patterns and trends. Usually aimed at transforming large volumes of unstructured data in a form that can be used to make decisions.
61
Data redundancy
Data redundancy occurs in database systems where a field is repeated unnecessarily as a result of a one-to-many or many-to-many relationship.
62
Data verification
Checking to ensure that captured data is a legitimate copy of inputted data. Performed when data has been entered. For example inputting a password twice.
63
Data warehouse
A data warehouse is a database storing data from many sources over a period of time for reporting and data analysis in order to make decisions.
64
Data structure
A data structure is a specialised format for organising and storing data in a program. General data structure types include the array, the file, the record
65
Data validation
Checking that captured data is logically correct and falls within acceptable ranges for that data. Validation is performed at the time of input.
66
Data verification
Checking to ensure that captured data is a legitimate copy of inputted data. Performed when data has been entered. For example inputting a password twice.
67
Data warehousing
A data warehouse is a database storing data from many sources over a period of time for reporting and data analysis in order to make decisions.
68
Database management system (DBMS)
Database Management System is software that provides database functionality to physical users or client software that needs data. These systems are capable of storing large amounts of structured data which can be easily queried and accessed using SQL or other similar languages.
69
DDR Memory
Double Data Rate. A type of SDRAM which sends and receive signals twice per clock cycle
70
DDR Memory
Double Data Rate. A type of SDRAM which sends and receive signals twice per clock cycle
71
Defragmentation
The process of locating the non-contiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.
72
Denial of service attack (DoS)
A 'denial-of-service' attack is characterised by an explicit attempt by attackers to prevent legitimate users of a service from using that service. Examples include attempts to 'flood' a network, thereby preventing legitimate network traffic
73
Derived data
Data in the field of a database which has been created from two or more existing fields in the database table, for example: calculating the age from the date of birth
74
Device driver
A device driver is a computer program that provides communication between the device and the Operating System. A piece of software that controls a peripheral on a computer.
75
DHCP
The Dynamic Host Configuration Protocol is a standardised network protocol that is used by network server to provide a unique IP address to all nodes as they join the network
76
Digital Divide
The digital divide refers to the difference between people who have easy access to the Internet and IT resources and those who do not.
77
Digital signature
Data added to a file to authenticate its source. The Digital signature is verified by consulting a Digital Authority organisation which keeps an original record of the signature.
78
Distributed processing
Refers to a network setup where individual terminals have sufficient processing power to complete their tasks without reference to a central powerful server (refer to Centralised Processing).
79
Distributed database
A system where parts of a database (the data and the DBMS) are spread (distributed) across servers in separate locations.
80
DNS (Domain Name Service/ Server)
An Internet service that maps domain names to numerical IP addresses
81
Domanin name
Domain name A string that translates back to an IP address to allow access to a website.
82
DRAM
Dynamic RAM. A memory chip that uses capacitors and needs to be refreshed.
83
Duplicate data
Data that is repeated in the database for valid reasons. For example two people living in the same suburb
84
EEPROM
Electronically Erasable Programmable Read Only Memory – a type of ROM that can be erased electronically, after which a new 'image' of the upgraded contents can be written back.
85
GPU
Graphics Processing Unit – dedicated graphics processor on a graphics card, used to render images stored in the RAM of the graphics card.
86
Hardware interrupt
A signal to the CPU indicating a device needs attention. For example, a mouse click or a keystroke
87
E-book
An electronic version of a printed book which can be read on a computer or a specifically designed handheld device A publication/book made available in digital/electronic form.
88
Embedded Operating System
A dedicated operating system installed in mobile handheld devices, appliances, equipment and vehicles. Normally on a ROM chip.
89
EMI
Electro Magnetic Interference. The disruption of signal caused by proximity to an electromagnetic field from another electronic device.
90
Emulation
Emulation is the process of duplicating the function of a computer system in a computer not designed for that system, for example, running PC software on an Apple computer.
91
Encryption
Converting data into an unreadable form according to a specified set of rules to ensure the privacy of data during communication, or for security purposes.
92
Ergonomics
The practice of designing equipment/furniture/etc. so that it minimises strain on the human body, e.g. ergonomic keyboards, mouse, chairs, etc.
93
Ethernet
System for connecting a number of computer systems in a LAN, with reference to communication protocols, transmission speeds and media, collision management and hardware.
94
Extranet
An organisation's intranet (or part thereof) which is available to other users outside the organisation.
95
Fat Client
A computer with full CPU, memory, backing storage and local software connected to a network using a Server-Client setup.
96
Firewall
Hardware and/or software that monitors the traffic between a computer and the Internet, to safeguard against breaches in security.
97
Firewire
A high speed port developed by the Apple corporation to transfer high volume data such as video .
98
Firmware
Software that is permanently installed on a ROM chip.
99
Flaming
Posting or sending offensive messages over the Internet.
100
Flash memory
101
Flash memory
Flash memory is a type of EEPROM (electronically erasable programmable ROM) used in memory cards, USB memory-sticks, music players, cell phones and solid-state drives.
102
Foreign keys
A field in a table (not a primary key) which contains data that exists in the primary key field of another table. The mechanism by which relations are created between the tables of a relational database.
103
Freeware
Software that is distributed freely. You do not receive the source code. There is no limitation on the time or functionality included.
104
Front Side Bus
A high speed bus which connects the CPU and the Northbridge. The Northbridge connects to faster components on the motherboard, primarily RAM.
105
FTP (File Transfer Protocol)
The protocol used for the transfer of files between remote computers that have an Internet connection.
106
GIGO
'Garbage In, Garbage Out'; the quality of the output for any computer system is directly related to the quality of the input.
107
Global Unique Identifiers
A globally unique identifier (GUID) is a 128-bit number created by the Windows operating system or another Windows application to uniquely identify specific components, hardware, software, files, user accounts, database entries and other items. It is a term used by Microsoft for a number that its programming generates to create a unique identity for an entity such as a Word document.
108
Hybrid hard drives
Hybrid hard drives blend HDD capacity with SSD speeds by placing traditional rotating platters and a small amount of high-speed flash memory on a single drive. Hybrid storage products monitor the data being read from the hard drive, and cache the most frequently accessed bits to the high-speed NAND flash memory.
109
Hyper threading
Hyperthreading (HT) technology uses two sets of registers on the CPU to simulate a second CPU allowing for fast context switching between processes.
110
IAAS
Infrastructure as a Infrastructure as a service is where computer resources, such as hardware, software and networks are owned and hosted by a service provider and offered to customers on- demand.
111
Interactive processing
Interactive processing is where a program produces output in response to input while the program is running.
112
Interpreters
Software that translates programming instructions into machine code one line at a time and executes them immediately.
113
Interrupt
A signal sent to the CPU indicating that a device or process needs attention.
114
Intranet
An organisation's internal web site that usually provides access to various documents and resources.
115
IP address
An address for a device in a TCP/IP network.
116
IrDA
The Infrared Data Association (IrDA) is a set of protocols for wireless infrared communications.
117
ISP
ISP Internet Service Provider. A company which provides access to the Internet.
118
Json
JavaScript Object Notation is a platform-independent, human readable, text file used for transferring data between web services and browsers or applications
119
Keylogger
Malware that sits in a computer's memory without the users knowledge and records keystrokes and then sends them to a remote computer. Used to find usernames, passwords, etc.
120
LBS (Location Based Services)
Software applications that make use of GPS-enabled devices' locations to provide more relevant information to users. A piece of software that uses data about your physical position to control features of an application.
121
MAC Address
Media Access Control address. A unique identifier assigned to a network device by the manufacturer (e.g. a network card or wireless router), for example, B1:3C:45:AC:8D:FF (6 groups of hexadecimal numbers).
122
Machine Cycle
Steps taken by the CPU in carrying out instructions: Fetching instructions and data from the memory (RAM); Decoding the instructions; Executing the instruction; Transferring data back to the memory.
123
Malware
Malicious software installed without users' knowledge and designed to negatively affect the operation of a computer system.
124
Microblog
The posting of short text entries usually via a cellphone or smartphone, on a platform like Twitter.
125
Microwave transmission
A high speed line of sight technology for wireless connection. (A microwave refers to electromagnetic energy having a frequency higher than 1 gigahertz)
126
Modular design
A computer design philosophy which incorporates a variety of re-usable stand-alone components, thereby facilitating upgrades and maintenance.
127
MPEG
The digital compression standards and file formats developed by the Moving Picture Experts Group. MPEG-4 is the latest standard.
128
Multi Core
A technology where 2 or more complete microprocessors are built into a single CPU chip, e.g. Dual-core; Quad-core.
129
Multi-processing
Processing technique where multiple tasks are processed on more than one physical processor/core.
130
Multi-tasking
Descriptive of an operating system which can execute two or more independent task simultaneously, as in multicore and hyperthreading, or the OS can appear to run two or more tasks simultaneously in a single CPU by Time-Slicing
131
Multi-threading
The ability of a program to create independent parts called threads. For example downloading a file in a web browser while searching for a web page. When a CPU has multiple cores, each thread can be run on a different core at the same time
132
Netiquette
Netiquette is etiquette on the internet. It is a set of rules which specify appropriate behaviour when communicating over the internet.
133
Network backbone
A part of a network that connects all other parts of the same network together.
134
Normalisation – 1NF, 2NF, 3NF
The process of designing a database by splitting the data into related tables to reduce data redundancies and to avoid anomalies such as update, insert and delete which threaten the integrity and usability of the database.
135
Northbridge
Part of a chipset by Intel which controls the communication between the CPU, Primary memory and the faster components on the motherboard, e.g. accelerated graphic ports and PCI.
136
Onion routing
Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion. The encrypted data is transmitted through a series of network nodes called onion routers, each of which "peels" away a single layer, uncovering the data's next destination.
137
Overclocking
Overclocking is the process of making a computer or component operate faster than the clock frequency specified by the manufacturer by modifying system parameters. Most overclocking techniques increase power consumption, generating more heat, which must be dispersed if the chip is to remain operational.
138
PAAS
Platform as a Service is part of cloud concept that provides a computing platform for the development of software by users
139
Parallel Sets
Parallel Sets (ParSets) is a visualization application for categorical data, like census and survey data, inventory, and many other kinds of data that can be summed up in a cross-tabulation
139
Parallel Sets
Parallel Sets (ParSets) is a visualization application for categorical data, like census and survey data, inventory, and many other kinds of data that can be summed up in a cross-tabulation
140
Parameters
A list of data which is passed into a method, procedure or function. Usually each parameter has a name and type associated with it, shown in the brackets after a method, procedure or function name
141
PCI Express
PCI Express is bus design for communication between CPU, memory. It uses serial connections and a switch to provided dedicated point-to-point link between components on a motherboard
142
Peer-to-peer network
A network in which each workstation has the same rights. Each terminal controls the files on its local drive and attached hardware determining whether it may be shared by others on the network. It is characterised by the absence of a server.
143
Peripheral
Any computer hardware device, such as a printer, that you connect to your PC via an USB Port. It is not part of the essential computer, i.e. the memory and microprocessor.
144
Pharming
When a hacker attempts to redirect your web traffic to a fake Web site that looks legitimate. The fake Web site requests you to enter confidential information.
145
Phishing
Attempts from people, generally employing e-mail with links, to direct users to fake websites, where they are tricked into releasing personal information (e.g. passwords)
146
Plug and Play
A technology that automates the installation and configuration process of a new device.
147
Plug-ins
Programs which add extra features to software, such as a web browser. These programs are needed to allow the user to view 'special' effects.
148
Podcast
Audio/Video files that are designed to be downloaded and played on mobile devices such as an iPod.
149
Polymorphism
In object-oriented programming, polymorphism refers to a programming language's ability to process objects differently depending on their data type or class. For example, see method overriding and method overloading. Methods which have the same signature but different functionality.
150
POP3 (Post Office Protocol 3)
The most common protocol used for downloading e-mail via the Internet from POP3 servers.
151
Portal
A Web portal or public portal refers to a Web site or service that offers a broad array of resources and services, such as e-mail, forums, search engines, and online shopping malls.
152
Portal
A Web portal or public portal refers to a Web site or service that offers a broad array of resources and services, such as e-mail, forums, search engines, and online shopping malls.
153
POS
Point Of Sale software. The software used to manage tills in shops and supermarkets. Usually linked to some form of stock control software.
154
POST .
Power On Self Test – start-up test performed by the BIOS to ensure that all essential hardware (RAM, keyboard, etc.) is present and in working order. Primary key A field or combined fields which act as a unique identifier of a record. Protocol A set of rules and regulations which govern data transmission.
155
Proxy server
A server in an organisation to cache web pages in order to reduce network traffic. All subsequent requests to the same site on the Internet will be provided by the proxy server.
156
RAD
Rapid Application Development is a software development methodology that uses minimal planning in favour of rapid prototyping. The lack of extensive pre-planning generally allows software to be written much faster, and makes it easier to change requirements
157
RAID
Redundant Array of Inexpensive/Independent Disks – the configuration of two or more hard drives to act as one large storage utility, designed to minimise the possibility of data loss by storing the data across all of the Disks (Data Striping) and providing a redundant copy of the data (Mirroring).
158
Range check
A method of checking the validity of input data by determining whether the values fall within an expected range.
159
Ransomware
Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
160
Registers
A register is a small amount of storage space on a CPU to store the current instruction to be processed.
161
Remote Access
In computer networking, remote access technology allows logging into a system as an authorised user without being physically present at its keyboard.
162
Repeater
A repeater is an electronic device that receives a signal and boosts it at a higher level or higher power so that the signal can cover longer distances
163
RFID .
Radio-frequency identification (RFID) is the wireless use of radio-frequency electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects.
164
RIA (Rich Internet Applications)
A web application that is designed to deliver the functions and features of a traditional desktop application. Web browsers are required for access. Unlike traditional applications, the installation of software is not needed.
165
ROM
Read-Only Memory is non-volatile memory chip where the contents are retained after power is switched off.
166
Rootkit
Collection of programs designed to use administrator rights to gain control of a computer for malicious purposes.
167
Router
A device that makes it possible for networks to communicate over the Internet, by directing data packets to its correct destination by determining the best path. The global standard routing is TCP/IP.
168
RSI
Repetitive Strain Injury are injuries caused by repetitive tasks, for example, prolonged use of the mouse causing Carpal Tunnel Syndrome in the wrist.
169
SAAS
Software as a service is a software delivery model in cloud computing in which software and associated data are centrally hosted on the cloud by independent software vendors (ISVs) or application service providers (ASPs), e.g. Google Apps.
170
SATA
An interface suitable for connecting a hard disk drive.
171
SATA
An interface suitable for connecting a hard disk drive.
172
Semantic Search Engine
Semantic search is a data searching technique in a which a search query aims to not only find keywords, but to determine the intent and contextual meaning of the words a person is using for search in order to return more relevant results.
173
Server Virtualisation
Server virtualisation is the act of replacing the functions of several separate physical servers with one piece of hardware. Several instances of server operating system can be installed on this virtual host. This provides for more efficient use of the hardware and energy and allows for fault tolerance.
174
Siphoning
Siphoning is a technique used to fraudulently redirect traffic that would normally be directed to website in search engine results.
175
SMTP (Simple Mail Transfer Protocol)
The most common protocol used for sending e-mail via SMTP servers on the Internet.
176
Social Engineering
Any attempt to manipulate someone into installing malware or giving out sensitive or personal information.
177
Social Engineering
Any attempt to manipulate someone into installing malware or giving out sensitive or personal information.
178
Software Interrupt
A signal to the CPU by a program or process indicating a program experiencing a problem such as invalid user input, or a divide by 0 error.
179
Southbridge
The Southbridge is one of the two chips in the core logic chipset on a personal computer motherboard, the other being the Northbridge. The Southbridge connects slower components such as the HDD.
180
Spoofing
The substitution of email or web site addresses with false addresses in order to make a email or web site appear legitimate.
181
Spyware
A form of malware that tries to monitor and track the way you use your computer to discover confidential information, and then relay this to a third party. Keyloggers are an example of Spyware
182
SRAM
Static Random Access Memory is memory that does not require constant refreshing of the data it stores. This makes it faster than dynamic RAM as clock cycles aren't spent refreshing data.
183
SSL
Secure Sockets Layer is a protocol for transmitting private documents via the Internet. SSL encrypts data before sending.
184
Streaming
The progressive download of files (usually video or audio) over the internet. The file is not saved to your device. On-demand services for audio and video are available.
185
Voice over Internet Protocol (VoIP)
A protocol that allows telephone calls to be made over LANs, WANs and the Internet
186
Switch
An Ethernet Switch is device used to manage network collisions and to act as physical connection point for network cabling.
187
Synchronise
The process where data files on different devices are updated with the latest copy so that both versions of the files are identical.
188
System Clock
A small quartz crystal that pulses at a regular frequency measured in GHz; used to coordinate activities on a motherboard.
189
System Utility TCP/IP TCP/IP is a protocol suite that is widely used to transmit information in networks.
A program that performs a very specific task, usually related to managing system resources. System software performs 'housekeeping like' tasks.
190
Thin Client
A computer on a network with reduced CPU, memory and storage. Relies on a powerful server on the network to perform most of these functions. Some thin client solutions have no storage at all.
191
Thunderbolt
A fast connection technology replacing firewire and offering speeds of 10Gbs.
192
Tor
Tor is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Router". Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis.
193
Twitter
A microblog which limits entries to 280 characters.
194
UML
Unified Modelling Language is a set of design methods and tools used for designing and engineering object-oriented software. These tools include class diagrams, use case diagrams and interaction diagrams.
195
Unicode
Unicode is 2 byte code developed to represent all known human language characters on a computer.
196
UPS
An Uninterruptible Power Supply is a large rechargeable battery. It maintains sufficient power to allow a server to keep running until it can shut down cleanly and safely. A UPS also smoothes the power output coming from the mains to avoid power spikes which would likely damage a computer.
197
URL
A Uniform Resource Locator is a string which consists of the protocol + the domain name + the website file being accessed, for example, http://mysite.com/index.html.
198
URL
A Uniform Resource Locator is a string which consists of the protocol + the domain name + the website file being accessed, for example, http://mysite.com/index.html.
199
Virtual machine
A virtual machine is a software emulation of a computer which can execute programs as though it were the actual machine.
200
Virtual memory
Using an area on the hard disk as an extension to RAM. The data in RAM is divided into pages which swopped in and out of memory from the hard disk whenever the application in memory requires them. Virtual memory slows down the performance.
201
Virtual Reality (VR)
Virtual reality (VR) is a simulated experience that can be similar to or completely different from the real world. Applications of virtual reality include entertainment (particularly video games), education (such as medical or military training) and business (such as virtual meetings). Other distinct types of VR-style technology include augmented reality and mixed reality, sometimes referred to as extended reality or XR
202
Virtual Private Network (VPN)
A network implemented via a public network such as the Internet. This enables the user to log onto a network from a remote location with the same benefits of privacy and security as a LAN.
203
Virus
A computer virus is a malicious program that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves.
204
Vlog (Video Blog)
A form of blog which uses video as the medium. Entries normally combine video supported by text and images.
205
Vodcast (Video Podcast)
A form of podcast which includes video clips or photos and is downloaded and played as a movie.
206
Voice over Internet Protocol (VoIP)
A protocol that allows telephone calls to be made over LANs, WANs and the Internet.
207
WAP
Wireless Application Protocol is an internet based protocol for transferring data to small handheld devices.
208
Web 1.0
Earliest stage in the evolution of the WWW, characterised by mostly static content and a 'read- only' role on the part of the consumer public.
209
Web 2.0
The next stage in the evolution of the WWW, characterised by more dynamic content and an interactive 'read-write' role on the part of the consumer public. Content consumers can become content creators as well, for example, on social networking sites.
210
Web 3.0
Semantic Web is another name for the Web 3.0.
211
Wiki
A website where users can collaboratively modify, add or delete its content. Much more than just an encyclopaedia.
212
Wi-Max
An upgrade of WiFi technology, allowing for more secure communication at greater speed over a wider area.
213
Zombies
A zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or Trojan horse and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of zombie computers are often used to spread e-mail spam and launch denial-of-service attacks.
214
Access Modifier
A keyword defining the visibility of a method or field in a class. Private access modifier indicates that the field or method is only visible inside the class, public indicates it is available outside the class and protected indicates it is available within the package.
215
Accessor
A function that returns the value of a private field in an object. Attribute Fields or property of a class defining the data associated with each object.
216
Class
A class is the definition used to create instances of itself, called objects. Classes define the attributes and methods that each object created from that class will have.
217
Constructor
A constructor is the method which instantiates an object and assigns values to the attributes/fields of an object.
218
Encapsulation
Combining fields and methods describing an object into one class.
219
Helper method
A private method in an object/class. A method which assists/uses another method
220
Information Hiding
The principle of allowing controlled access to the attributes of an object through methods (such as gets, sets and toString) while securing those attributes by making them Private or Protected.
221
Inheritance
The methods and attributes of a parent class are available to a Child class in order to create reliable reusable code.
222
Methods/behaviours
In object-oriented programming, a method (or member function) is a subroutine (or procedure or function) designed to act on the object's fields.
223
Mutator
Commonly known as a set method. A method in object oriented programming which changes the value of an object's field/attributes.
224
Object
An instance of a class created by running the constructor method of the class. The Object inherits the attributes and methods defined in the class.
225
OOP design
Object-oriented design is the process of planning a system of interacting objects for the purpose of solving a software problem. It is one approach to software design.
226
Overloading
Methods in the same class which have the same name but have different parameters. Parameters may be of a different type and/or the number of parameters may be different.
227
Overriding
Methods, one in a parent class and the other in a child class which have the same name and parameters. The method in the child class is invoked rather than the parent class method